BCB virtual currency conversion
Leverage is a common financial transaction system, namely margin system
Leverage trading is also called virtual trading and deposit trading. That is to say, investors use their own funds as guarantee to enlarge the financing provided by banks or brokers to carry out foreign exchange transactions, that is, to enlarge the trading funds of investors. The proportion of financing is generally decided by banks or brokers. The larger the proportion of financing is, the less capital customers need to pay
leverage trading operation process:
1. Take BTC / usdt as an example, if the platform supports up to three times leverage
when judging that the price of bitcoin will rise from 10000 usdt to 20000 usdt, if you have 10000 usdt of principal, you can borrow up to 20000 usdt from the platform. Use 30000 usdt to buy 3btc at the price of 10000 usdt and sell it at the price of 20000 usdt, with a profit of 3btc * (20000-10000) = 30000 usdt
2. Take BTC / usdt as an example, if the platform supports up to 3 times leverage
when it is judged that the price of bitcoin will drop from 20000 usdt to 10000 usdt, with a principal of 10000 usdt (0.5btc), you can borrow 1btc from the platform, sell one bitcoin at 20000 usdt, and buy it at 10000 usdt, making a profit of 10000 usdt
if you only trade with your own funds, you can only buy low and sell high, not short
3. Calculation method of leverage lending rate:
from the time of applying for leverage, the interest will be calculated as 24 hours in less than 24 hours, and the loan funds and interest will be returned when the leverage is returned
4, the risk of leverage Trading:
leverage makes use of less capital to realize the possibility of obtaining greater returns. But if the wrong direction of the transaction is judged, the loss will also be enlarged year on year. Therefore, ordinary traders try to avoid the high leverage of heavy trading, to prevent the occurrence of burst positions or even through positions
(1) reasonable use of leverage ratio and control of position (2) stop profit and loss timely and close positions spontaneously (3) margin should be added in time to ensure that the ratio of total assets to leverage is greater than 110%extended data
related functions of leverage Trading:
1. Loan account:
each loan transaction pair corresponds to a loan account. For example, ETH / BTC will correspond to an eth / BTC loan account (including two sub accounts of Eth and BTC)
users can transfer Eth and BTC monetary assets in the transaction account to eth / BTC lending account; Eth / BTC loan account can be applied for loan in two types of currency assets: Eth and BTC
2. Fund transfer:
users can't recharge to the loan account directly for the time being, so they can transfer the funds from the transaction account to the loan account by fund transfer
(1) when the user borrows, the part of the loan account with a risk rate higher than 200% can be transferred out to the transaction account
(2) when the user has no loan, all the available funds in the account can be transferred out to the transaction account
3. Apply for loan:
the user enters the loan management and selects the loan account to apply for loan assets. The amount of digital currency that the user can apply for loan depends on the account principal and platform leverage ratio. The maximum amount of loan that the user can apply for is net asset conversion (BTC) × Multiple - 1) - borrowed assets
for example, if the maximum leverage ratio of the platform is 3 times, the number of digital currencies that users can borrow is 2 times of the principal
if possible, it is recommended to find a professional sine security for website security< It is suggested that users upload and maintain web pages through FTP, and try not to install ASP upload program
2. The call of ASP upload program must be authenticated, and only trusted people are allowed to use the upload program. This includes all kinds of news releases, shopping malls and forum programs. As long as you can upload files, you need to authenticate your identity
3. The user name and password of ASP program administrator should be complex, not too simple, and should be changed regularly
4. To download the ASP program from the regular website, the database name and storage path should be modified after downloading, and the database file name should also have certain complexity
5. Try to keep the program up to date
6. Do not add a link to the landing page of the background management program on the web page
7. In order to prevent the program from having unknown vulnerabilities, you can delete the login page of the background management program after maintenance, and then upload it through FTP ring the next maintenance
8. Always back up important files such as database
9. Daily maintenance should be done, and attention should be paid to whether there are ASP files of unknown origin in the space. Remember: a sweat, for a safety
10. Once found to be invaded, unless you can identify all Trojan files, you should delete all files
11. Regularly check the security of the website by using some tools on the Internet, such as the Internet security detection platform of Anda
Two: Horse hanging recovery measures:
1. Modify the account password
whether it is business or not, the initial password is mostly admin. So the first thing you get from a website program is to "change your account password.". The account number
password should not be used before, but be changed to something special. Try to put the letters, numbers and symbols together. In addition, the password should be more than 15 digits. If you use
sql, you should use a special account password, and don't use any admin, or you will be easily invaded< Create a robots.txt
robots can effectively prevent hackers who use search engines to steal information
3. Modify the background file
Step 1: modify the name of the verification file in the background
Step 2: modify CONN.ASP to prevent illegal downloading, or modify CONN.ASP after encrypting the database
Step 3: modify the acess database name. The more complex the database, the better. If possible, change the directory where the data is located
4. Restrict login background IP
this method is the most effective, every virtual host user should have a function. If your IP is not fixed, please change it every time. Security first< User defined 404 page and user-defined transmission of ASP error information
404 enables hackers to batch search some important files in your background and check whether there are injection vulnerabilities in the webpage
ASP error may send the information the other party wants to the unknown
6. Choose the website program carefully
pay attention to whether there are loopholes in the website program itself. You and I should have a balance between good and bad
7. Careful upload vulnerability
it is learned that upload vulnerability is often the simplest and most serious, which can make hackers or hackers easily control your website
uploading can be prohibited or restricted. If you don't understand, you can find your website program provider
8. Cookie protection
try not to visit other sites when logging in to prevent cookie leakage. Remember to exit when you close all browsers
9. Directory permissions
please set some important directory permissions to prevent abnormal access. For example, do not give the upload directory execution script permission and do not give the non upload directory write permission
10. Self test
nowadays, there are a lot of hacker tools on the Internet, so you can find some to test whether your website is OK
11. Routine maintenance
A. backup data regularly. It's best to back up once a day. After downloading the backup file, you should delete the backup file on the host in time
B. change the name of the database and the account secret of the administrator regularly
C. with the help of web or FTP management, check the volume of all directories, the last modification time and the number of files, check whether the files are abnormal, and check whether there are abnormal accounts
generally, websites are hanged because the website program has loopholes or the server's security performance is not up to the standard and is attacked by illegal hackers
it is a common phenomenon that websites are hanged, but it is also the trouble of every website operator
have you ever wanted to give up because your website and servers are hacked every day? Have you delayed the operation of your website because you don't know much about the website technology? Do you feel impatient because your well-run website is repeatedly hacked by some boring hackers. Conditional suggestions to find a professional website security sine security to do security maintenance.